Page 56 / 106 Scroll up to view Page 51 - 55
52
Using the Web-Based Advanced User Interface
Using a Hexadecimal Key
A hexadecimal key is a mixture of numbers and letters from A–F
and 0–9. 64-bit keys are 10 digits long and can be divided into five
two-digit numbers. 128-bit keys are 26 digits long and can be divided
into 13 two-digit numbers.
For instance:
AF 0F 4B C3 D4
= 64-bit key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7
= 128-bit key
In the boxes below, make up your key by writing in two characters
between A–F and 0–9. You will use this key to program the encryption
settings on your Router and your wireless computers.
Note to Mac users:
Original Apple AirPort products support 64-bit
encryption only. Apple AirPort 2 products can support 64-bit or 128-bit
encryption. Please check your product to see which version you are
using. If you cannot configure your network with 128-bit encryption,
try 64-bit encryption.
Page 57 / 106
53
Using the Web-Based Advanced User Interface
section
1
9
2
3
4
5
6
7
8
10
Using the Access Point Mode
Note:
This advanced feature should be employed by advanced users
only. The Router can be configured to work as a wireless network
access point. Using this mode will defeat the NAT IP sharing feature
and DHCP server. In Access Point (AP) mode, the Router will need to
be configured with an IP address that is in the same subnet as the
rest of the network that you will bridge to. The default IP address
is 192.168.2.254 and subnet mask is 255.255.255.0. These can be
customized for your need.
1.
Enable the AP mode my selecting “Enable”
(1)
in the “Use as
Access Point only” page. When you select this option, you will be
able to change the IP settings.
2.
Set your IP settings to match your network. Click
“Apply Changes”
(2)
.
3.
Connect a cable from the “Modem” port on the Router to your
existing network.
The Router is now acting as an access point. To access the Router’s
Web-Based Advanced User Interface again, type the IP address
you specified into your browser’s navigation bar. You can set the
encryption settings, MAC address filtering, SSID, and
channel normally.
(2)
(1)
Page 58 / 106
54
Using the Web-Based Advanced User Interface
Setting MAC Address Control
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the wireless network.
Note:
This list applies only to wireless computers. This list can be
configured so any computer attempting to access the wireless network
that is not specified in the filter list will be denied access. When you
enable this feature, you must enter the MAC address of each client
(computer) to which you want to allow network access. The “Block”
feature lets you turn on and off access to the network easily for any
computer without having to add and remove the computer’s MAC
address from the list.
(4)
(1)
(3)
(2)
Page 59 / 106
55
Using the Web-Based Advanced User Interface
section
1
9
2
3
4
5
6
7
8
10
Setting up an Allow Access List
1.
Select the “Allow” radio button
(1)
to begin setting up a list of
computers allowed to connect to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the
MAC address of the wireless computer to which you want to give
access to the wireless network.
3.
Continue to do this until all of the computers you want to add
have been entered.
4.
Click “Apply Changes”
(4)
to finish.
Setting up a Deny Access List
The “Deny Access” list lets you specify computers that you DO NOT
want to access the network. Any computer in the list will not be
allowed access to the wireless network. All others will.
1.
Select the “Deny” radio button
(2
) to begin setting up a list of
computers to be denied access to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the
MAC address of the wireless computer to which you want to deny
access to the wireless network.
3.
Continue to do this until all of the computers you want to deny
access to have been entered.
4.
Click “Apply Changes”
(4)
to finish.
(1)
(3)
(4)
(2)
Page 60 / 106
56
Using the Web-Based Advanced User Interface
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “stealth” meaning that
for all intents and purposes, they do not exist to a would-be hacker.
Disabling the firewall protection will not leave your network completely
vulnerable to hacker attacks, but it is recommended that you leave the
firewall enabled.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top